Ian Grigg

Ian Grigg
Peer For Peer Foundation

BSc(Hons) in Computer Science, UNSW; MBA London Business School

About

26
Publications
45,768
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
755
Citations
Additional affiliations
January 1994 - June 1996
London Business School
Position
  • Executive MBA

Publications

Publications (26)
Conference Paper
Full-text available
Financial Cryptography is substantially complex, requiring skills drawn from diverse and incompatible, or at least, unfriendly, disciplines. Caught between Central Banking and Cryptography, or between accountants and programmers, there is a grave danger that efforts to construct Financial Cryptography systems will simplify or omit critical discipli...
Conference Paper
Full-text available
Describing digital value for payment systems is not a trivial task. Simplistic methods of using numbers or country codes to describe currencies, and ticker tape symbols to issue bonds, shares, and other financial instruments soon run into shortcomings in their ability to handle dynamic and divergent demands. The seemingly arbitrary variations in th...
Working Paper
Full-text available
Article
Full-text available
Classical double entry accounting has provided the foundation for accounting within the firm for many centuries. The digitally signed receipt, an innovation from financial cryptography, gives rise to exactly duplicated entries for each of 3 parties or roles, the outcome of which we call triple entry accounting. This presents a challenge to double e...
Article
Full-text available
Most Artificial Intelligence (AI) implementations so far are based on the exploration of how the human brain is designed. Nevertheless, while significant progress is shown on specialized tasks, creating an Artificial General Intelligence (AGI) remains elusive. This manuscript proposes that instead of asking how the brain is constructed, the main qu...
Chapter
This chapter sets out some critical reflections on the creation of the ‘Ricardian Contract’, the most direct antecedent for the ‘smart legal contract’, and more recent developments in blockchain-based ‘smart contracts’. In the halcyon days of 1995, Ian Grigg looked for a way to capture the nature of financial agreements in order to create an instru...
Article
Full-text available
An exemplary paradigm of how an AI can be a disruptive technological paragon via the utilization of blockchain comes straight from the world of deep learning. Data scientists have long struggled to maintain the quality of a dataset for machine learning by an AI entity. Datasets can be very expensive to purchase, as, depending on both the proper sel...
Article
Full-text available
In which I apply the Ricardian Contract ideas to solving the problem of too many blockchains, and in the process create a network object design pattern now apparently tagged as The Ricardian Triple, which provides design direction for smart contracts, identity, IoT and chains.
Article
Full-text available
Bitcoin’s inclusion of the smart contract form invented by Nick Szabo has thrust this design into the forefront. An alternate design, the Ricardian Contract designed by the present author, is currently used by a few innovatory systems such as OpenTransactions, OpenBazaar, Askemos and CommonAccord. Mark Miller sees these as two halves of a split con...
Article
Full-text available
The problem of cryptographic numerology has plagued modern cryptography throughout most of its life. The basic concept is that as long as your encryption keys are at least "this big," you're fine, even if none of the surrounding infrastructure benefits from that size or even works at all. The application of cryptographic numerology conveniently dir...
Conference Paper
Full-text available
How does a lightweight community Certification Authority ("CA") engage in the heavyweight world of PKI and secure browsing? This talk tracks the systems audit of CAcert, an open-membership CA, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm. It will walk through the background of "wh...
Working Paper
Full-text available
Article
Full-text available
In the security community, we’ve always recognized that our security proposals come with certain costs in terms of usability. Traditionally, that’s the compromise we make to get security. But the market has ruled against us. Time and time again, our fielded secure systems are ignored, bypassed, turned off, or constrained to such a small part of the...
Article
Full-text available
Phishing is an attack on the user and her browser. Addressing phishing necessarily means changing the browser, and this creates tensions between those who lose money - users and ecommerce sites - and those who need to do the work - browser manufacturers.
Technical Report
Full-text available
Mutual funds are vulnerable to abuses involving market timing and late trading. Primarily, this is due to a failure of governance, and the delayed nature of settlement of both payments and transfers. This vulnerability is only exploited over time, through a progression of small steps that, individually, raise no alarm, but in sum, cross the line of...
Article
Full-text available
Financial Cryptography is substantially complex, requiring skills drawn from diverse and incompatible, or at least, unfriendly, disciplines. Caught between Central Banking and Cryptography, or between accountants and programmers, there is a grave danger that efforts to construct Financial Cryptography systems will simplify or omit critical discipli...
Conference Paper
Full-text available
The state of Digital Trading on the Internet is surveyed with the assistance of case studies of high-profile service providers. These providers use the Internet for delivery of trading instructions, and IPO data, and some hope to build exchanges based on Internet access. The efficiencies so far demonstrated indicate dramatic structural change. An a...
Conference Paper
Full-text available
The Internet was built using the efforts of a worldwide team of programmers that coordinated and competed through laissez-faire methods. Much of the effort was freely provided, or paid for by entities in a process that did not conform to normal commercial revenue-seeking or government regulatory behaviour. This points to major inefficiencies in the...

Network

Cited By